security
Ten Cybersecurity Horror Stories
Cybersecurity breaches have become the horror stories of the digital age Whispered among tech circles and sending shivers down the spines of IT professionals, this Halloween, we’re delving into the archives to ...
How to Opt Out of CPNI Data Sharing
Tom Eston | | ATT, CPNI, CPNI Data Sharing, CPNI Opt Out, Cybersecurity, Data Privacy, Digital Privacy, Episodes, fcc, Federal Communications Commission, government, Information Security, Infosec, Internet, Internet Provider, Mobile, mobile phone, Mobile Provider, Phone Call, Phone Calls, Podcast, Privacy, regulation, security, smartphone, T-Mobile, technology, telecommunications, telephone, verizon, Weekly Edition
Did you know that your mobile phone provider can give data like phone numbers you’ve called and received, the time and date of those calls, and even your location data to their ...
Aviation Cybersecurity Best Practices
Nik Hewitt | | advice, application protection, Best Practices, Cybersecurity, lateral movement, microsegmentation, next gen security, security, Security Research, zero trust
Navigating today’s digital skyways means robust aviation cybersecurity The Heightened Importance of Aviation Cybersecurity In a time when the aviation industry is increasingly dependent on digital technologies, aviation cybersecurity is a pivotal ...
The Role of Network Security Segmentation in Strengthening Cybersecurity
Nik Hewitt | | Best Practices, Cybersecurity, device protection, lateral movement, microsegmentation, next gen security, security, Security Research, service account protection, zero trust
Going beyond boundaries, granular network security segmentation has distinct advantages for strengthening cybersecurity As digital footprints expand exponentially, organizations must adopt proactive approaches to ensure the sanctity and security of their networks. ...
Cloud-Native Security: A Tipping Point for Security Teams’ Productivity
Brooke Motta | | CISOs, Cloud-native, cnapp, Cybersecurity, K8s, Kubernetes, security, Shifting Security Left, SIEM
cloud-native application development has caused a veritable maelstrom for security teams ...
Security Boulevard
Ten Proactive Strategies to Mitigate Zero-Day Threats
Nik Hewitt | | advice, Best Practices, Cybersecurity, microsegmentation, next gen security, security, Security Research, zero trust
Patching is critical, but what else can security teams do to stay ahead of zero-day threats? After running a poll on our TrueFort LinkedIn Page last week, asking our friends and followers ...
Java Is Still Full of Surprises After 28 Years
State of Java 2023 is an authoritative guide to understanding Java adoption and trends, Oracle’s recent pricing update. The post Java Is Still Full of Surprises After 28 Years appeared first on ...
AppSec Metrics That Matter: Measuring the Success of Your Application Security Program
As cybersecurity threats grow more sophisticated and widespread, organizations grapple with an essential question: How do you quantify the success of an application security (AppSec) program? AppSec is the practice of safeguarding ...
Security Boulevard
AI-Powered Cybersecurity: Fortifying Against Data Breaches
Deepak Gupta - Tech Entrepreneur, Cybersecurity Author | | AI (Artificial Intelligence), Cyber Security, data protection, security
AI: The game-changer in cybersecurity, empowering organizations to defend against data breaches and cyberattacks proactively ...
Special Guest Jayson E. Street, Phantom Hacker Scams, 23andMe User Data For Sale
Tom Eston | | 23andMe, credential stuffing, Cyber Security, Cybersecurity, Data breach, Data Privacy, data theft, Digital Privacy, DNA, DNA Data, Elderly, Elderly Scams, Episodes, FBI, Fraud, Information Security, Infosec, Jayson E Street, Jayson Street, Password, passwords, Phantom Hacker, Podcast, Podcasts, Privacy, Scams, Secure Yeti, security, Security Awareness, Senior Scams, Seniors, tech support scams, technology, weak passwords, Weekly Edition
In milestone episode 300, Jayson E. Street (a renowned hacker, helper, and human who has successfully robbed banks, hotels, government facilities, and Biochemical companies on five continents) joins us to share what ...